Search Results - "Okan Seker"

  • Showing 1 - 12 results of 12
Refine Results
  1. 1

    A White-Box Masking Scheme Resisting Computational and Algebraic Attacks by Seker, Okan, Eisenbarth, Thomas, Liskiewicz, Maciej

    “…White-box cryptography attempts to protect cryptographic secrets in pure software implementations. Due to their high utility, white-box cryptosystems (WBC) are…”
    Get full text
    Journal Article
  2. 2

    From MLWE to RLWE: A Differential Fault Attack on Randomized & Deterministic Dilithium by ElGhamrawy, Mohamed, Azouaoui, Melissa, Bronchain, Olivier, Renes, Joost, Schneider, Tobias, Schönauer, Markus, Seker, Okan, Van Vredendaal, Christine

    “…The post-quantum digital signature scheme CRYSTALS-Dilithium has been recently selected by the NIST for standardization. Implementing CRYSTALSDilithium, and…”
    Get full text
    Journal Article
  3. 3

    Side-Channel Protections for Picnic Signatures by Aranha, Diego F., Berndt, Sebastian, Eisenbarth, Thomas, Seker, Okan, Takahashi, Akira, Wilke, Luca, Zaverucha, Greg

    “…We study masking countermeasures for side-channel attacks against signature schemes constructed from the MPC-in-the-head paradigm, specifically when the MPC…”
    Get full text
    Journal Article
  4. 4

    Extending Glitch-Free Multiparty Protocols to Resist Fault Injection Attacks by Okan Seker, Abraham Fernandez-Rubio, Thomas Eisenbarth, Rainer Steinwandt

    “…Side channel analysis and fault attacks are two powerful methods to analyze and break cryptographic implementations. At CHES 2011, Roche and Prouff applied…”
    Get full text
    Journal Article
  5. 5
  6. 6

    Extending Glitch-Free Multiparty Protocols to Resist Fault Injection Attacks by Seker, Okan, Fernandez-Rubio, Abraham, Eisenbarth, Thomas, Steinwandt, Rainer

    “…Side channel analysis and fault attacks are two powerful methods to analyze and break cryptographic implementations. At CHES 2011, Roche and Prouff applied…”
    Get full text
    Journal Article
  7. 7
  8. 8

    Big Data’yı anlamak: verinin bilgiye dönüşümünde ekonomik gözetim: Amazon örneği by Şeker,Okan, Atiktürk,Ayşenur

    “…Bu çalışmada yeni medya ortamlarında, veri paylaşımının artmasıyla ortaya çıkan Big Data’nın (Büyük Veri) toplanması, işlenmesi ve kullanılama sunulması…”
    Get full text
    Journal Article
  9. 9

    On The Success Probabilities Of Differential Attacks On Present by Sulak,Fatih, Şeker,Okan

    “…Advanced growth in ubiquitous devices leads to increasing popularity of lightweight cryptography and as a result, various block ciphers are designed. The…”
    Get full text
    Journal Article
  10. 10

    A Randomness Test Based on Postulate R-2 on the Number of Runs by Şeker, Okan

    Published 01-01-2014
    “…Random values are considered as an indispensable part of cryptography, since they are necessary for almost all cryptographic protocols. Most importantly, key…”
    Get full text
    Dissertation
  11. 11

    Elon Musk: geleceğin dahilerine / Ashlee Vance ; çevirmen, Ali Atav ; editör, Ahmet Okan Şeker by Vance, Ashlee, Atav, Ali, Şeker, Ahmet Okan

    Published 2018
    “…2017 Kasım’ında ElonMusk Ankara’ya geldi ve Anıtkabir’i ziyareti esnasında çektiği fotoğrafı şu sözlerle paylaştı: “Üç kırık kaburga, delik bir akciğer ve yine…”
    Get more information
    Book
  12. 12

    Suriyeli mültecilerin değişen toplumsal cinsiyet rolleri by Şeker,Okan

    Published in 21. Yüzyılda Eğitim ve Toplum (2019)
    “…Bu araştırmada ülkelerinden iç savaş nedeniyle kaçıp Türkiye’ye sığınan Suriyeli mültecilerin göç süreci boyunca başlayan ve daha sonrasında değişentoplumsal…”
    Get full text
    Journal Article